Ataques Furtivos em Sistemas de Controle Físicos Cibernéticos
Abstract
The advantages of using communication networks to interconnect controllers and physical plants motivate the increasing number of Networked Control Systems, in industrial and critical infrastructure facilities. However, this integration also exposes such control systems to new threats, typical of the cyber domain. In this context, studies have been conduced, aiming to explore vulnerabilities and propose security solutions for cyber-physical systems. In this paper, it is proposed a covert attack for system degradation, which is planned based on the intelligence gathered by another attack, herein proposed, referred as System Identification attack. The simulation results demonstrate that the joint operation of the two attacks is capable to affect, in a covert and accurate way, the physical behavior of a system.
References
de Sá, A. O., Nedjah, N., and de Macedo Mourelle, L. (2016). Distributed efficient localization in swarm robotic systems using swarm intelligence algorithms. Neurocomputing, 172:322–336.
El-Sharkawi, M. and Huang, C. (1989). Variable structure tracking of dc motor for high performance applications. Energy Conversion, IEEE Transactions on, 4(4):643–650.
Farooqui, A. A., Zaidi, S. S. H., Memon, A. Y., and Qazi, S. (2014). Cyber security backdrop: A scada testbed. In Computing, Communications and IT Applications Conference (ComComAp), 2014 IEEE, pages 98–103. IEEE.
Hussain, A., Heidemann, J., and Papadopoulos, C. (2003). A framework for classifying denial of service attacks. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages 99–110. ACM.
Hwang, H., Jung, G., Sohn, K., and Park, S. (2008). A study on mitm (man in the middle) vulnerability in wireless network using 802.1 x and eap. In Information Science and Security, 2008. ICISS. International Conference on, pages 164–170. IEEE.
Khatri, S., Sharma, P., Chaudhary, P., and Bijalwan, A. (2015). A taxonomy of physical layer attacks in manet. International Journal of Computer Applications, 117(22).
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. Security & Privacy, IEEE, 9(3):49–51.
Long, M., Wu, C.-H., and Hung, J. Y. (2005). Denial of service attacks on network-based control systems: impact and mitigation. Industrial Informatics, IEEE Transactions on, 1(2):85–96.
Ramos, C., Vale, Z., and Faria, L. (2011). Cyber-physical intelligence in the context of power systems. In Future Generation Information Technology, pages 19–29. Springer.
Smith, R. (2011). A decoupled feedback structure for covertly appropriating networked control systems. In Proceedings of the 18th IFAC World Congress 2011, volume 18. IFAC-PapersOnLine.
Smith, R. S. (2015). Covert misappropriation of networked control systems: Presenting a feedback structure. Control Systems, IEEE, 35(1):82–92.
Teixeira, A., Shames, I., Sandberg, H., and Johansson, K. H. (2015). A secure control framework for resource-limited adversaries. Automatica, 51:135–148.
Tran, T., Ha, Q. P., and Nguyen, H. T. (2007). Robust non-overshoot time responses using cascade sliding mode-pid control. Journal of Advanced Computational Intelligence and Intelligent Informatics.
